| Welcome, Guest |
You have to register before you can post on our site.
|
| Latest Threads |
KatuChef Titanium Cutting...
Forum: General
Last Post: KatuChef
Yesterday, 12:28 PM
» Replies: 0
» Views: 28
|
Any Updates coming up for...
Forum: CCNP ENCOR 350-401 Forum
Last Post: forumsupport
Yesterday, 10:09 AM
» Replies: 1
» Views: 59
|
Another ENARSI pass
Forum: CCNP ENARSI 300-410 Forum
Last Post: help_desk
Yesterday, 09:29 AM
» Replies: 1
» Views: 67
|
AND78
Forum: Answer this question
Last Post: help_desk
12-09-2025, 01:52 PM
» Replies: 1
» Views: 255
|
AN652
Forum: Answer this question
Last Post: help_desk
12-09-2025, 11:21 AM
» Replies: 1
» Views: 161
|
AND34
Forum: Answer this question
Last Post: help_desk
12-09-2025, 11:16 AM
» Replies: 1
» Views: 163
|
AND35
Forum: Answer this question
Last Post: help_desk
12-09-2025, 10:43 AM
» Replies: 1
» Views: 159
|
AND20
Forum: Answer this question
Last Post: help_desk
12-09-2025, 10:38 AM
» Replies: 1
» Views: 137
|
AND51
Forum: Answer this question
Last Post: help_desk
12-09-2025, 10:32 AM
» Replies: 1
» Views: 146
|
AND73
Forum: Answer this question
Last Post: help_desk
12-09-2025, 10:26 AM
» Replies: 1
» Views: 151
|
|
|
| Another ENARSI pass |
|
Posted by: gs145 - 12-11-2025, 09:30 PM - Forum: CCNP ENARSI 300-410 Forum
- Replies (1)
|
 |
Passed ENARSI earlier this week with thanks to the resources on here. Some details of what was in there:
Labs:
PBR3 with some variations.
A very basic DMVPN (configure nhrp auth and set it up for phase 2)
A variation on timestamps/SNMP
A lab I'd not seen on here albeit IPSEC was enough to get enough of the background on it. It was DMVPN with IKEV2 IPSEC, then phase3 on top of that, then OSPF on top of that.
Have attempted the exam once prior to this and the labs felt a whole world more difficult than in that previous attempt.
Multiple choice questions were largely ok. I got one drag and drop which was AR201 MPLS concepts. I'd say maybe 60-70% of the questions were those I definitely recognised from here (and bang on to the point I knew the answer as soon as the question loaded). The others were slight variants on or I knew roughly what the answer was. Maybe 3-4 I guessed at.
Study: I went hard on this and was doing batches of 30x questions 7/8 times a day, interspersed with whole days where I'd rattle through all of the labs to the point I knew them off by heart. It was draining and soul destroying but I'm bloody minded.
As I said, I failed first time, bought this sub on 15 Nov and passed on 8 Dec. Would happily recommend the site.
|
|
|
| AND73 |
|
Posted by: JamesJones - 12-08-2025, 02:23 AM - Forum: Answer this question
- Replies (1)
|
 |
These terms do not reflect what question AND73 is saying is "correct"
Please have a look and update accordingly.
agentless- device hardware that runs without embedded management features
agent- easy-to-manage deployment option that may lack scalability
provision -to automatically install or deploy a configuration or update
pull- daemon that determines when the central authority has updates available
push- model in which the central server sends updates to nodes on an as-needed basis
Thanks,
James
|
|
|
| AND51 |
|
Posted by: JamesJones - 12-08-2025, 02:07 AM - Forum: Answer this question
- Replies (1)
|
 |
I am finding that several drag-and-drop have wrong answers such as this one
Please correct the answers as they currently say "Listen - has heard from the neighbor" and "Learn - is waiting to hear from the neighbor."
Here is the correct order:
Active → is forwarding packets[/font]
Standby → is ready to forward packets if the active fails[/font]
Listen → is waiting to hear from the neighbor device[/font]
Speak → is transmitting and receiving hello packets[/font]
Learn → has heard from the neighbor device and is receiving hello packets
http://ccnpexcellence.blogspot.com/2011/...works.html
HSRP states
1. Initial
This is the starting state and indicates that HSRP is not running.
This state is entered via a configuration change or when an
interface first comes up.
2. Learn
The router has not determined the virtual IP address, and not yet
seen an authenticated Hello message from the active router. In
this state the router is still waiting to hear from the active
router.
3. Listen
The router knows the virtual IP address, but is neither the active
router nor the standby router. It listens for Hello messages from
those routers.
4. Speak
The router sends periodic Hello messages and is actively
participating in the election of the active and/or standby router.
A router cannot enter Speak state unless it has the virtual IP
address.
5. Standby
The router is a candidate to become the next active router and
sends periodic Hello messages. Excluding transient conditions,
there MUST be at most one router in the group in Standby state.
6. Active
The router is currently forwarding packets that are sent to the
group's virtual MAC address. The router sends periodic Hello
messages. Excluding transient conditions, there MUST be at most
one router in Active state in the group.
|
|
|
| AND20 |
|
Posted by: JamesJones - 12-08-2025, 12:11 AM - Forum: Answer this question
- Replies (1)
|
 |
- CQ (Custom Queuing):
✅ services a specified number of bytes in one queue before continuing to the next queue.
❌ The list incorrectly says CQ provides guaranteed bandwidth to a specific class of traffic (that’s CBWFQ).
- CBWFQ (Class-Based Weighted Fair Queuing):
✅ provides guaranteed bandwidth to a specific class of traffic.
❌ The list incorrectly says CBWFQ services a specified number of bytes per queue (that’s CQ).
So the accurate mapping should be:- PQ: places packets into one of four priority-based queues.
- CQ: services a specified number of bytes in one queue before continuing to the next queue.
- WFQ: provides minimum guaranteed bandwidth to one or more flows.
- CBWFQ: provides guaranteed bandwidth to a specific class of traffic.
- FIFO: uses store-and-forwarding queueing.
|
|
|
| AND35 |
|
Posted by: JamesJones - 12-07-2025, 03:30 AM - Forum: Answer this question
- Replies (1)
|
 |
Rapid PVST+ forwarding state actions
- Frames received from the attached segment are processed
(The port actively forwards frames from its connected segment.)
- Switched frames received from other ports are advanced
(Frames from other ports are switched out through this port.)
- The port in the forwarding state responds to network management messages
(It participates in network management protocols like SNMP.)
- BPDUs received from the system module are processed and transmitted
(The port sends and receives BPDUs to maintain spanning tree.)
❗ The other options belong to different states:- Frames received from the attached segment are discarded → Blocking state.
- BPDUs received are forwarded to the system module → Listening/Learning states.
Your answer shows
BPDUs received are forwarded to the system module
Please correct and advise
thanks,
James
|
|
|
| AN652 |
|
Posted by: JamesJones - 12-07-2025, 02:44 AM - Forum: Answer this question
- Replies (1)
|
 |
Which two protocols are used by an administrator for authentication and configuration on access points?
Answer says "802.1x, and RADIUS"
Can you please verify.
Answer: - TACACS+
(Terminal Access Controller Access-Control System Plus – used for administrator authentication and authorization for device configuration.)
- RADIUS
(Remote Authentication Dial-In User Service – also used for authentication, commonly for both administrators and wireless clients.)
❗ Why not the others?- Kerberos → Used for secure authentication in Active Directory environments, not typically for AP configuration.
- 802.1Q → VLAN tagging protocol, not for authentication/configuration.
- 802.1X → Used for client authentication (not admin configuration).
thanks,
James
|
|
|
| AND34 |
|
Posted by: JamesJones - 12-07-2025, 02:28 AM - Forum: Answer this question
- Replies (1)
|
 |
Please correct this drap and drop as some of the answers that show as "correct" are wrong.
[*]✅ Correct vs Incorrect:
- Sniffer mode: allows for packet captures of wireless traffic.
✔ Correct – Sniffer mode is used for capturing 802.11 frames for analysis.
- FlexConnect mode: allows the access point to communicate with the WLC over a WAN link.
✔ Correct – FlexConnect is designed for remote sites where APs connect to WLC over WAN.
- Monitor mode: receive only mode which acts as a dedicated sensor for RFID and IDS.
❌ Incorrect – Monitor mode is for detecting rogue APs and IDS scanning, not RFID. It does not serve clients.
- Bridge mode: preferred for connecting access points in a mesh environment.
✔ Correct – Bridge mode is used for mesh APs or point-to-point bridging.
- Local mode: transmits normally on one channel and monitors other channels for noise and interference.
✔ Correct – Local mode serves clients and performs RRM scanning.
- Rogue detector mode: monitor for rogue APs, does not handle data at all.
❌ Incorrect – Rogue detector mode listens for MAC addresses from wired networks to detect rogue APs, not wireless monitoring.
[*]This is what is actually correct:
[*]Monitor mode →
monitor for rogue APs, does not handle data at all
(Used for detecting rogue access points and IDS/IPS scanning.)
[*]Bridge mode →
preferred for connecting access points in a mesh environment
(AP acts as a bridge between two networks, common in mesh setups.)
[*]FlexConnect mode →
allows the access point to communicate with the WLC over a WAN link
(Ideal for remote sites where APs connect to a central WLC over WAN.)
[*]Local mode →
transmits normally on one channel and monitors other channels for noise and interference
(Default mode for APs; serves clients and performs RRM scanning.)
[*]Rogue detector mode →
receive only mode which acts as a dedicated sensor for RFID and IDS
(Used for detecting rogue devices; does not transmit.)
[*]Sniffer mode →
allows for packet captures of wireless traffic
(Captures 802.11 frames for analysis in Wireshark or similar tools.)
|
|
|
|